SYCS-Computer Networks (CN)
Assignment-3
a)TELNET: The TELNET protocol is based upon the notion of a virtual telepet , employing a
7-bit ascii character set. The primary function of a User TELNET, then, is to provide the
means by which its users can 'hit' all the keys on that virtual teletype.
A)The Telnet service is the application providing services over the Telnet protocol. Most
operating systems provide a service that can be installed or enabled to provide Telnet
services to clients
B)The Telnet client may be used in debugging network services such as SMTP, IRC, HTTP,
FTP or POP3, to issue commands to a server and examine the responses.
C) For example, Telnet client applications can establish an interactive TCP session to a port
other than the Telnet server port. However, communication with such ports does not involve
the Telnet protocol, because these services merely use a transparent 8-bit TCP connection
b. WWW :
a)A network protocol is a set of established rules that specify how to format, send and receive
data so that computer network endpoints, including computers, servers, routers and virtual
machines, can communicate despite differences in their underlying infrastructures, designs or
standards.
b)Network protocols break larger processes into discrete, narrowly defined functions and
tasks across every level of the network
c) WWW stands for World Wide Web and is commonly known as the Web. The WWW was
started by CERN in 1989. WWW is defined as the collection of different websites around the
world, containing different information shared via local servers(or computers).
d) A Web browser is used to access web pages. Web browsers can be defined as programs
which display text, data, pictures, animation and video on the Internet. Hyperlinked resources
on the World Wide Web can be accessed using software interfaces provided by Web
browsers. Initially, Web browsers were used only for surfing the Web but now they have
become more universal.
C)FTP
1. **Features:**
- **File Transfer:** FTP is designed for the transfer of files between a client and a server.
- **Authentication:** Supports user authentication with a username and password.
- **Directory Listing:** Allows users to view the contents of remote directories.
- **Passive and Active Modes:** Supports both passive and active modes for data transfer.
2. **Frame Format:**
- **Control Connection:** Uses a control connection for sending commands and receiving
responses. It typically operates on port 21.
- **Data Connection:** Establishes a separate data connection for transferring the actual files. This
can operate in passive or active mode.
3. **Working:**
- **Command-Response Model:** FTP follows a command-response model. The client sends
commands to the server over the control connection, and the server responds accordingly.
- **Authentication:** Users typically log in with a username and password.
- **Data Transfer Modes:**
- **Active Mode:** The client opens a random port for data transfer, and the server connects to it.
- **Passive Mode:** The server opens a random port for data transfer, and the client connects to it.
4. **Advantages:**
- **Widespread Usage:** FTP has been widely adopted and is supported on various platforms.
- **Simple to Use:** The basic commands are straightforward, making it user-friendly.
d. HTTP:
Features:
A)Hypertext Transfer: Designed for the transfer of hypertext, allowing the retrieval of text, images,
videos, and other multimedia content.
B)Stateless: Each request from a client to a server is independent, and the server doesn't retain
information about the client's state between requests.
C)Connectionless: No persistent connection is maintained between the client and the server. Each
request and response are standalone.
Working:
A)Client-Server Model: Operates on a client-server architecture where clients (such as web browsers)
make requests to servers for resources.
Request Methods:
GET: Retrieve data from the server.
POST: Submit data to be processed to a specified resource.
PUT: Update a resource on the server.
DELETE: Remove a resource on the server.
Advantages:
A)Compatibility: HTTP is widely supported across various platforms, making it a universal protocol
for web communication.
B)Simplicity: The protocol is relatively simple, making it accessible for developers and easy to
implement.
E) DNS :
DNS (Domain Name System):
1. **Features:**
- **Name Resolution:** DNS is used to resolve domain names (e.g., [Link]) to their
corresponding IP addresses (e.g., [Link]).
- **Hierarchical Structure:** DNS organizes domain names in a hierarchical tree structure, with top-
level domains (TLDs) at the root and subdomains beneath them.
- **Distributed Architecture:** DNS operates in a distributed manner, with multiple DNS servers
responsible for different domains.
2. **Frame Format:**
- **DNS Message Format:** Consists of a header section followed by question, answer, authority,
and additional sections.
- **Header Section:** Contains information such as the query type, response code, and flags.
3. **Working:**
- **Name Resolution Process:**
1. **Client Query:** A client sends a DNS query to resolve a domain name.
2. **Recursive Query:** If the local DNS resolver doesn't have the requested information cached, it
sends a recursive query to other DNS servers.
3. **Iterative Query:** If the recursive query fails, iterative queries are made, starting from the
root DNS servers and traversing down the DNS hierarchy until the requested information is found.
4. **Response:** The DNS server responds with the requested information, such as the IP address
associated with the domain name.
4. **Advantages:**
- **Human-Readable Addresses:** DNS allows users to access websites and services using easy-to-
remember domain names instead of numerical IP addresses.
- **Scalability:** The distributed nature of DNS enables it to handle a large volume of queries and
scale effectively as the internet grows.